Ultra-secure quantum communications

May 20, 2010

(PhysOrg.com) -- The risk of sensitive information falling into the wrong hands could be eliminated by a new quantum communication process that delivers unprecedented security.

UNSW telecommunications researcher Robert Malaney has developed the process, called "unconditional location verification", which ensures that even if an encryption password has fallen into the wrong hands, a secure message can only be seen by a recipient at an agreed geographic point.

Associate Professor Malaney, of the UNSW School of Electrical Engineering and Telecommunications, said quantum communications already allow unbreakable encryption but security can now be further enhanced using unconditional location verification.

"This takes to a level that hasn't previously been available," he said.

"With this process you can send data to a person at a particular location. If they are not at that location the process would detect that and you can stop the communication.

"This is a new application that you can deploy on current and emerging quantum networks. It opens up a range of new information security applications for both fibre and wireless communication networks.

"There would be many industries and organisations, banks for example, that would be interested in delivering information content in the sure knowledge a recipient is at an agreed-upon location."

The concept, which also has potential applications in the intelligence community, e-commerce and digital content distribution, is reported in the April edition of the American Physical Society journal Physical Review A.

The system works by sending paired "qubits" - particles, such as , which have been manipulated to contain specific - over a fibre optic or wireless network to a recipient. The recipient must send a return message, using information from the decoded qubits, to a number of reference points to open up a secure channel. Because operate at the speed of light and quantum information cannot be copied, the time to return the message can be accurately measured, ensuring that it has come from only one possible place.

Explore further: Mitsubishi, NEC, Tokyo University Realize Successful Interconnection of Quantum Encryption Networks

Related Stories

Shining light in quantum computing

September 12, 2006

University of Queensland scientist Devon Biggerstaff is investigating ways to manipulate light in a process that will help shape future supercomputers and communication technology.

'Dead time' limits quantum cryptography speeds

September 28, 2007

Quantum cryptography is potentially the most secure method of sending encrypted information, but does it have a speed limit" According to a new paper by researchers at the National Institute of Standards and Technology and ...

Secure Communication via Space

April 22, 2008

The exchange of information between distant sources is the basis of all communications, but quantum mechanics may open up this distant exchange as never before.

Scientists demonstrate all-fiber quantum logic

May 28, 2009

A team of physicists and engineers have demonstrated all-fibre quantum logic, where single photons are generated and used to perform the controlled-NOT quantum logic gate in optical fibres with high fidelity.

Recommended for you

A quantum of light for materials science

December 1, 2015

Computer simulations that predict the light-induced change in the physical and chemical properties of complex systems, molecules, nanostructures and solids usually ignore the quantum nature of light. Scientists of the Max-Planck ...

Quantum dots used to convert infrared light to visible light

December 1, 2015

(Phys.org)—A team of researchers at MIT has succeeded in creating a double film coating that is able to convert infrared light at modest intensities into visible light. In their paper published in the journal Nature Photonics, ...

Test racetrack dipole magnet produces record 16 tesla field

November 30, 2015

A new world record has been broken by the CERN magnet group when their racetrack test magnet produced a 16.2 tesla (16.2T) peak field – nearly twice that produced by the current LHC dipoles and the highest ever for a dipole ...

Turbulence in bacterial cultures

November 30, 2015

Turbulent flows surround us, from complex cloud formations to rapidly flowing rivers. Populations of motile bacteria in liquid media can also exhibit patterns of collective motion that resemble turbulent flows, provided the ...


Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.